CN103685198B - A kind of method and apparatus of interaction of user data - Google Patents

A kind of method and apparatus of interaction of user data Download PDF

Info

Publication number
CN103685198B
CN103685198B CN201210356956.6A CN201210356956A CN103685198B CN 103685198 B CN103685198 B CN 103685198B CN 201210356956 A CN201210356956 A CN 201210356956A CN 103685198 B CN103685198 B CN 103685198B
Authority
CN
China
Prior art keywords
access
user
mark
data traffic
subset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201210356956.6A
Other languages
Chinese (zh)
Other versions
CN103685198A (en
Inventor
赵雪波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201210356956.6A priority Critical patent/CN103685198B/en
Priority to TW101146891A priority patent/TWI579708B/en
Priority to US14/023,060 priority patent/US9525744B2/en
Priority to PCT/US2013/059186 priority patent/WO2014046934A1/en
Priority to JP2015533107A priority patent/JP5922848B2/en
Publication of CN103685198A publication Critical patent/CN103685198A/en
Application granted granted Critical
Publication of CN103685198B publication Critical patent/CN103685198B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user

Abstract

This application discloses a kind of method and apparatus of interaction of user data, for improving the safety of website visiting.The method selects at least one header domain information and network address mark from each access the access request that user submits to, composition is multiple to access set, and determine that each accesses the corresponding information loss rate of set, each unification user mark accessing user is determined according to the set that accesses that information loss rate is minimum, and interacts each user data accessing user accordingly.Due in said process, website need not respectively access user's corresponding unification user mark to third-party server application, therefore decrease user profile and divulge a secret chance, increased the safety of website visiting.

Description

A kind of method and apparatus of interaction of user data
Technical field
The application is related to Internet technical field, more particularly, to a kind of method and apparatus of interaction of user data.
Background technology
With the development of Internet technology, between each internet site, pass through the use of interactive access user to a certain extent User data is such that it is able to be appreciated more fully from the access information of user so that each internet site can believe according to the access of user Breath, provides the user the product more conforming to user's request.
In order to realize the purpose of the user data of the same user of interaction between different internet sites, each internet site It needs to be determined that a unique mark is used for identifying user, and in interaction of user data, this user is interacted according to this unique mark User data.Specifically, each internet site, when user accesses, can send request to uniform server, to apply for this use The unique mark at family, the subscription client feature carrying in the request that uniform server sends according to website generates this user and corresponds to Unique mark, and return to each website, this unique mark is write in subscription client Cookie by each website, each the Internet net The user data stood further according to this unique mark this user of interaction.
In said process, due to each website be required to as third-party uniform server application access user corresponding Unique mark, and by application to unique mark be stored in subscription client Cookie, there is user profile and divulge a secret risk in this, Reduce the safety of website visiting.
Content of the invention
The application provides a kind of method and apparatus of interaction of user data, for improving the safety of website visiting.
The embodiment of the present application provides a kind of method of interaction of user data, including:
Receive each access request accessing user's submission, the initial user carrying access user in access request identifies, extremely A few header domain information and network address mark;
Select at least one header domain information from the header domain information that each access request carries, using the header field of selection Information and the access user corresponding network address multiple access of mark composition are gathered;
For multiple each access set accessing in set, determine that this access is integrated into right in the range of specified data traffic The information loss rate answered;
Each unification user mark accessing user is determined according to the set that accesses that information loss rate is minimum, and according to each access The each user data accessing user of unification user mark interaction of user.
The embodiment of the present application provides a kind of device of interaction of user data, including:
Receiving unit, for receiving each access request accessing user's submission, carries in access request and accesses the first of user Beginning ID, at least one header domain information and network address mark;
Select unit, for select from the header domain information that each access request carries at least one header domain information and Access the user corresponding network address multiple access of mark composition to gather;
Determining unit, for accessing set for each, determines that this access is integrated into corresponding in the range of specified data traffic Information loss rate;
Data interaction unit, determines each unification user accessing user for the set that accesses minimum according to information loss rate Mark, and according to each each user data accessing user of unification user mark interaction accessing user.
The embodiment of the present application provides a kind of method and device of interaction of user data, and the method accesses what user submitted to from each At least one header domain information and network address mark is selected, composition is multiple to access set, and determines each visit in access request Ask set corresponding information loss rate, each unification user mark accessing user is determined according to the set that accesses that information loss rate is minimum Know, and interact each user data accessing user accordingly.Because, in said process, website need not be each to third-party server application Access user's corresponding unification user mark, therefore decrease user profile and divulge a secret chance, increased the safety of website visiting.
Brief description
The process of the interaction of user data that Fig. 1 provides for the embodiment of the present application;
Fig. 2 is integrated into corresponding information loss in the range of target flow for one access of determination that the embodiment of the present application provides The process of rate;
Fig. 3 closes the corresponding relation schematic diagram and initial user mark between for the access subset that the embodiment of the present application provides;
The apparatus structure schematic diagram of the interaction of user data that Fig. 4 provides for the embodiment of the present application.
Specific embodiment
User is accessed for each due between website each in prior art during interaction of user data, need to utilize and be somebody's turn to do Some relevant informations accessing user identify to the corresponding unification user of third-party server application this access user, therefore, There is certain risk of divulging a secret during this, reduce the safety of website visiting.In view of this, the embodiment of the present application is using each Access the header domain information carrying in the access request that user submits to and determine that unification user identifies, and need not be to third-party server Application unification user mark, to reduce the purpose of user profile risk of leakage, the safety of raising website visiting.
Below in conjunction with Figure of description, the preferred embodiment of the application is illustrated it will be appreciated that described herein Preferred embodiment is merely to illustrate and explains the application, is not used to limit the application, and in the case of not conflicting, this Shen Please in embodiment and the feature in embodiment can be mutually combined.
The process of the interaction of user data that Fig. 1 provides for the embodiment of the present application, comprises the following steps:
S101:Receive each access request accessing user's submission.
Wherein, one access user submit to access request in carry this access user initial user mark, at least one Individual header domain information and network address mark.Network address mark can be for accessing user's corresponding network interconnection agreement (Internet Protocol, IP) address;The initial user mark of user can identify for user cookie;Work as access request When being HTML (Hypertext Markup Language) (hypertext transport protocol, http) access request, this access request carries Header field information include at least one in following information:Accept-Language (language that user accepts) information, Accept-Encoding (coded system that user accepts) information, User-Agent (user agent) information and user client Client information, subscription client information includes:UA-Pixels (subscription client pixel) information, UA-Color (subscription client color Color) information, UA-OS (subscription client operating system) information, UA-CPU (subscription client CPU) information etc..Separately Outward, access request can also be the access request of other agreements, specifically do not limit in the application.
S102:Select at least one header domain information from the header domain information that each access request carries, using selection Header domain information and the access user corresponding network address multiple access of mark composition are gathered.
For the ease of description, respectively with A, B, C, D represent Accept-Language, Accept-Encoding, User- Agent and subscription client information, for example, access for user it is assumed that access user is corresponding for network address identical Network address mark is IP1, then, according to the permutation and combination between this four kinds of header domain informations, 15 can be formed () plant to access and gather, respectively:[A, IP1], [B, IP1], [C, IP1], [D, IP1], [A, B, IP 1], [A, C, IP 1], [A, D, IP1], [B, C, IP1], [B, D, IP1], [C, D, IP1], [A, B, C, IP1], [A, B, D, IP1], [A, C, D, IP1], [B, C, D, IP1], [A, B, C, D, IP1].
S103:For multiple each access set accessing in set, determine that this access is integrated into specified data traffic model Enclose interior corresponding information loss rate.
In the embodiment of the present application, this specified data traffic scope can be set first, specifically can set according to actual needs Put this data traffic scope.For example, this specified data traffic scope could be arranged to specify the data of (in 1 day) in the time period Flow.And for example, for e-commerce website, its data traffic source is main to be included:Login page and the number of user mutual According to the data traffic of the data traffic of flow, the goods browse page and user mutual, the commodity transaction page and user mutual, because This is it is also possible to be set to a certain kind or the page of several types and the data flow of user mutual by this specified data traffic scope Amount.
After being provided with this specified data traffic scope, then can determine respectively by above-mentioned steps S102 form every Individual access is integrated into the information loss rate in the range of this specified data traffic.
For one accesses set, the information loss rate that this access is integrated in the range of this specified data traffic is permissible Characterize:Determine the accuracy of each unification user mark accessing user, credibility in other words using this access set.That is, should The information loss rate that access is integrated in the range of this specified data traffic is lower, determines each access user's using this access set The accuracy of unification user mark is higher, and credibility is bigger in other words, conversely, this access is integrated into this specified data traffic scope Interior information loss rate is higher, determines that using this access set the accuracy of each unification user mark accessing user is lower, or Person says that credibility is less.
S104:Each unification user mark accessing user is determined according to the set that accesses that information loss rate is minimum, and according to Each each user data accessing user of unification user mark interaction accessing user.
The information loss rate being integrated into due to an access in the range of specified data traffic is lower, true using this access set The accuracy of fixed each unification user mark accessing user is higher, therefore, in each access set being formed by step S102, The minimum access set of the information loss rate in the range of specified data traffic selected, and according to this access set selected Determine each unification user mark accessing user, the accuracy improving the unification user mark determining that can try one's best.Follow-up then Can be according to each user data accessing user of unification user mark interaction of each access user determining.
Specifically, in step S103 shown in above-mentioned Fig. 1, access set for each, determine that this access is integrated into finger Fixed number is as shown in Figure 2 according to the method for information loss rate corresponding in range of flow.
Fig. 2 is integrated into corresponding information loss in the range of target flow for one access of determination that the embodiment of the present application provides The process of rate, specifically includes following steps:
S1031:The content of the header domain information being comprised according to this access set, this access set is reconfigured as multiple Access subset closes.
Wherein, the element that each access subset closes is content and the network address mark of header domain information.
For example, it is assumed that there being 3 users to have submitted access request, the initial user mark of this 3 users is respectively B1、B2、 B3, the network address mark of this 3 access users is IP1 it is intended that the quantity of data traffic in the range of data traffic is 50 Individual, it is now to determine the access collection that the element comprising is Accept-Language information, Accept-Coding information and IP1 [Accept-Language information, Accept-Coding information, IP1] the information loss rate in the range of target flow of conjunction.
If in the access request that this 3 users submit to, the particular content of Accept-Language information is Chinese, And the particular content of Accept-Coding information is coded system 1 and totally two kinds of coded system 2, then, for network address mark Know and be this 3 of IP1 access users, for access set [Accept-Language information, Accept-Coding information, IP1] access subset recombinated closes and is:[Chinese, coded system 1, IP1] and [Chinese, coded system 2, IP1].
For the ease of description, below with A1Represent Chinese and English, with C1And C2Presentation code mode 1 and coding staff respectively Formula 2 illustrates.
Namely the access subset of restructuring is combined into:[A1, C1, IP1] and [A1, C2, IP1].
S1032:In the range of this specified data traffic, count each access subset and be combined in each self-corresponding all initial use The data traffic carrying in the mark of family.
Because the header domain information carrying in access request is all from standard agreement, therefore, different access is used For family, the content of request header domain information that carries in its access request submitted to may identical it is also possible to different, that is, For an access subset closes, its corresponding access user may more than one.In addition, coming for same access user Say, in its different access request submitted to entrained header domain information may identical it is also possible to different.
Continue to use the example above it is assumed that:
Identify B in initial user1In the access request that corresponding access user submits to, exist using Chinese, coded system 1st, the access request that IP1 submits to, there is also the access request submitted to using Chinese, coded system 2, IP1;
Identify B in initial user2In the access request that corresponding access user submits to, exist using Chinese, coded system 1st, the access request that IP1 submits to, there is also the access request submitted to using Chinese, coded system 2, IP1;
Identify B in initial user3In the access request that corresponding access user submits to, only exist using Chinese, coding staff The access request that formula 1, IP1 submit to.
Then:Access subset closes [A1, C1, IP1] and [A1, C2, IP1], with user initial marking B1、B2、B3Corresponding relation As shown in Figure 3.Fig. 3 closes the corresponding relation and initial user mark between for the access subset that the embodiment of the present application provides and illustrates Figure, in figure 3, access subset closes [A1, C1, IP1] and identify B with initial user1、B2、B3Corresponding, access subset closes [A1, C2, IP1] identify B with initial user1、B2Corresponding.
Therefore, in the range of specified data traffic, namely in 50 data traffics, count [A1, C1, IP1] and corresponding B1、B2、B3The data traffic of upper carrying, counts [A1, C2, IP1] and in corresponding B1、B2The data traffic of upper carrying.
Specifically, one access subset of statistics is combined in the data traffic carry in its corresponding all initial user mark Method is:In the range of specified data traffic, the data traffic, the conjunction of this access subset that count the conjunction carrying of this access subset are corresponding Initial user identifies quantity, and this access subset closes the number that the corresponding access subset of corresponding each initial user mark closes Amount;Close corresponding each initial user mark for this access subset, determine that this access subset is combined in this initial user mark and holds The data traffic carrying;This access subset is combined in the data traffic sum carry in its corresponding each initial user mark, really It is set to this access subset and the data traffic carry is combined on its corresponding all initial user mark.
Wherein it is possible to adopt formulaDetermine that an access subset is combined in its corresponding initial user mark and carries Data traffic, N is that this access subset closes the data traffic carrying, and this access subset of i closes corresponding initial user and identifies quantity, J is the quantity that the corresponding access subset of this initial user mark closes.
Continue to use the example above it is assumed that in 50 data traffics specifying at this, having 30 to be carried on [A1, C1, IP1] on, have 20 are carried on [A1, C2, IP1] on, then:
For [A1, C1, IP1], N=30, its corresponding initial user mark is respectively B1、B2、B3, i=3, initial user Mark B1Corresponding access subset closes and is respectively [A1, C1, IP1] and [A1, C2, IP1], j=2, therefore, [A1, C1, IP1] carry In B1On data traffic be ((30/3)/2)=5;
Similar, [A1, C1, IP1] and it is carried on B2On data traffic be ((30/3)/2)=5, [A1, C1, IP1] carry In B3On data traffic be (30/3)=10, thus, access subset close [A1, C1, IP1] at it corresponding all initial The data traffic carrying in ID is (5+5+10)=20.
Accordingly, [A1, C2, IP1] and it is carried on B1On data traffic be ((20/2)/2)=5, [A1, C2, IP1] carry In B2On data traffic be ((20/2)/2)=5, therefore access subset closes [A1, C2, IP1] and corresponding all initial at it The data traffic carrying in ID is (5+5)=10.
S1033:The number carry in each self-corresponding all initial user marks is combined according to each access subset of statistics According to flow, determine that this access is integrated into corresponding information loss rate in the range of specified data traffic.
Specifically, formula can be adoptedDetermine that this access is integrated into corresponding information in the range of specified data traffic Loss rate, R represents that each access subset that this access set comprises is combined in and carries in each self-corresponding all initial user marks Data traffic sum, W represents all data traffic sums comprising in the range of specified data traffic.
Continue to use the example above, due to [A1, C1, IP1] and identify, in corresponding all initial users, the data flow carrying at it Measure as 20, access subset closes [A1, C2, IP1] and in its corresponding all initial user mark, the data traffic of carrying is 10 Individual, therefore R=20+10=30, W=50, thus, [Accept-Language information, Accept-Coding believes to access set Breath, IP1] in this 50 data traffics, corresponding information loss rate is:1-30/50=0.4.
It is more than that the information that one access of determination that the embodiment of the present application provides is integrated in the range of specified data traffic is damaged The method of mistake rate.In subsequent process, then can select the minimum set that accesses of information loss rate and determine each access user's Unification user identifies, and according to each each user data accessing user of unification user mark interaction accessing user.
Wherein, according to the method tool accessing each unification user mark accessing user of set determination that information loss rate is minimum Body is:The different access subclass comprising in being gathered using minimum the accessing of information loss rate respectively is as the system of different access user One ID.
Continue to use the example above, if accessing set [Accept-Language information, Accept-Coding information, IP1] Information loss rate minimum, then with this access set [Accept-Language information, Accept-Coding information, IP1] The access subset comprising closes [A1, C1, IP1] and as a same ID accessing user, [A is closed with access subset1, C2, IP1] access the same ID of user as another.
It should be noted that in upper example, initial user is identified with 3, namely there are 3 access users, and finally determine The unification user mark only 2 going out, can only identify 2 access users with this 2 unification user marks, so, adopt one When each access subset comprising in individual access set closes identification access user, the accuracy of its mark can decline.And it is accurate Property the degree that declines it is simply that being characterized by the information loss rate of above-mentioned calculating, therefore, in the embodiment of the present application will be according to letter Cease the minimum access set of loss rate to determine unification user mark.
Further it is also desirable to:Find a kind of access to gather, this each comprising in set that access accesses son Set and each initial user mark are completely one-to-one relations.So, the different access with comprising in this access set Subclass is come to identify the accuracy rate of different access user be 100%.But, almost can not find such access in practical application and collect Close, that is, for one accesses set, if each access subset that it comprises closes identified not with each initial user It is one-to-one relation, then, when closing identification access user with the access subset in this access set, will result in accuracy rate Decline.The situation that accuracy rate declines is caused to have following two:
When situation one, different access users adopt same access subset to close carrying data traffic, this same access Subclass does not identify different users.For example, the initial user in upper example is designated B1、B2、B33 access users, this 3 access user and all adopt access subset to close [A1, C1, IP1] and carry data traffic, but access subset closes [A1, C1, IP1] An access user can only be identified, that is, equally adopting [A1, C1, IP1] and carry 3 access users of data traffic not by area Branch away.
When situation two, same access user adopt different access subsets to close carrying data traffics, this same user The data traffic carrying can be identified as the data traffic that different users carry.For example, the initial user in upper example is designated B1Access user, this access user adopt access subset close [A1, C1, IP1] and [A1, C2, IP1] and carry data traffic, but It is, [A1, C1, IP1] and [A1, C2, IP1] and identify different users respectively, that is, being equally that initial user is designated B1Visit Ask that the data traffic that user carries but has been identified as the data traffic that two different users carry.
Therefore, the information loss amount that an access of above-mentioned calculating is integrated in specified data traffic access is it is simply that counting When calculating each access subset conjunction mark each access user adopting in this access set, due to above-mentioned situation one and situation two The decline of the accuracy rate brought.
Thus, for the computational methods in upper example it is also understood that:
As shown in figure 3, closing [A for access subset1, C1, IP1], because 3 access users employ [A1, C1, IP1] Carry data traffic, be therefore based on situation one, no matter adopt [A1, C1, IP1] and identified which access user, its accuracy rate also only hasFurther, on the basis of based on situation one, when using [A1, C1, IP1] and mark B1During corresponding access user, it is based on Situation two, B1Corresponding access user adopts [A1, C2, IP1] and the data traffic that carries also can be identified as other users and carry Data traffic, therefore adopts [A1, C1, IP1] and mark B1Corresponding access user accuracy rate beLikewise, adopting [A1, C1, IP1] and mark B2Corresponding access user accuracy rate beUsing [A1, C1, IP1] and mark B3Corresponding access user Accuracy rate beTherefore, [A is closed using access subset1, C1, IP1] mark one access user accuracy rate be
Similar, close [A for access subset1, C2, IP1], due to two access user (B1Corresponding access user and B2 Corresponding access user) employ [A1, C2, IP1] and carry data traffic, therefore it is based on situation one, no matter adopt [A1, C2, IP1] identify in this two which access user, its accuracy rate also only hasFurther, on the basis based on situation one On, when using [A1, C2, IP1] and mark B1During corresponding access user, based on situation two, B1Corresponding access user adopts [A1, C1, IP1] and the data traffic that carries also can be identified as the data traffic of other users carrying, therefore adopt [A1, C2, IP1] and mark Know B1Corresponding access user accuracy rate beLikewise, adopting [A1, C2, IP1] and mark B2Corresponding access user's Accuracy rate isTherefore, [A is closed using access subset1, C2, IP1] mark one access user accuracy rate be
Consider further that [A1, C1, IP1] and the shared ratio in total flow of the data traffic that carries[A1, C2, IP1] hold The ratio shared in total flow of data traffic carryingThen in this 50 data traffics, gather [Accept- using accessing Language information, Accept-Coding information, IP1] in two access subsets comprising close and identify different access respectively and use The accuracy rate at family is:Therefore, its accuracy rate have dropped 1-0.6=0.4, that is, information loss rate is 0.4.
Thus, it is as initial with each as possible that the embodiment of the present application actually finds a kind of each comprising access subset conjunction ID accesses set close to one-to-one, uses that is, determining to access using the minimum access set of information loss rate The unification user mark at family.
It is preferred that in order to ensure availability access user being identified using access set, in the embodiment of the present application, Information loss rate threshold value can be pre-set, when the minimum access set corresponding information loss rate of information loss rate is less than in advance If during threshold value, then the access subset that minimum the accessing of information loss rate comprises in gathering closes and can be used for identification access user, when When the minimum access set corresponding information loss rate of information loss rate exceedes predetermined threshold value, illustrate to wrap using in this access set The accuracy rate that the access subset containing closes identification access user is too low, and the access subset therefore comprising in this access set closes and cannot use In identification access user.
In the embodiment of the present application, because same user has different user data in different web sites, for example, search at certain There is the data to keyword search website, has the access data to each channel page in portal website, has in e-commerce website The behavioral datas such as goods browse, collection and transaction, therefore can preserve the different pieces of information of same user respectively in each website. After determining unification user mark it is possible to according to the unification user of this user mark to this user different web sites difference Data is spliced so that user data is more complete, and subsequently each website can be used for Optimizing Search, individual character according to their needs Change in the applications such as page push, advertisement pushing optimization.
Based on same application design, additionally provide a kind of device of interaction of user data in the embodiment of the present application, due to this To website visiting ID, the principle of device solve problem determines that method is similar, the enforcement of therefore this device may refer to method Enforcement, repeat no more in place of repetition.
The apparatus structure schematic diagram of the interaction of user data that Fig. 4 provides for the embodiment of the present application, specifically includes:
Receiving unit 401, for receiving each access request accessing user's submission, carries in access request and accesses user's Initial user mark, at least one header domain information and network address mark;
Select unit 402, for selecting at least one header domain information from the header domain information that each access request carries And access the multiple access set of user corresponding network address mark composition;
Determining unit 403, for accessing set for each, determines that this access is integrated into right in the range of specified data traffic The information loss rate answered;
Data interaction unit 404, determines each unification accessing user for the set that accesses minimum according to information loss rate ID, and according to each each user data accessing user of unification user mark interaction accessing user.
Described determining unit 403, including:
Combination subelement 4031, for accessing set for each, the header domain information being comprised according to this access set Content, this access set is reconfigured and closes for multiple access subsets, and the element that each access subset closes is header domain information Content and network address mark;
Statistics subelement 4032, is combined in each in the range of described specified data traffic, counting each access subset The data traffic carrying in corresponding all initial user marks;
Determination subelement 4033, for being combined in each self-corresponding all initial user marks according to each access subset of statistics The data traffic carrying in knowledge, determines that this access is integrated into corresponding information loss rate in the range of described specified data traffic.
According to below equation, described determination subelement 4033 is specifically for determining that this access is integrated into described specified data flow Corresponding information loss rate in the range of amount:Wherein:R represents that each access subset that this access set comprises is combined in each The data traffic sum carrying in corresponding all initial user marks;W represents that comprise in the range of specified data traffic owns Data traffic sum.
Described statistics subelement 4032, including:
Statistical module 40321, for closing for each access subset, in the range of described specified data traffic, statistics should Access subset closes the data traffic carrying, this access subset closes corresponding initial user and identifies quantity, and this access subset closes Corresponding each initial user identifies the quantity that corresponding access subset closes;
First determining module 40322, for closing corresponding each initial user mark for this access subset, determines this visit Ask the data traffic that subclass carries in this initial user mark;
Second determining module 40323, carries for being combined in this access subset in its corresponding each initial user mark Data traffic sum, be defined as this access subset and the data traffic carry be combined on corresponding all initial users mark.
According to below equation, described first determining module 40322 is specifically for determining that this access subset is combined in this initial use The data traffic that family mark carries:Wherein:N is that this access subset closes the data traffic carrying;It is right that this access subset of i closes The initial user mark quantity answered;J is the quantity that the corresponding access subset of this initial user mark closes.
Described data interaction unit 404 is additionally operable to, and determines that each access is used in the access set minimum according to information loss rate Before the unification user mark at family, determine that the minimum access set corresponding information loss rate of information loss rate is less than default threshold Value.
Described data interaction unit 404 is specifically for being comprised not with minimum the accessing in set of information loss rate respectively The unification user mark being different access user with access subset cooperation.
Specifically the device of above-mentioned interaction of user data may be located in the server of website.
The embodiment of the present application provides a kind of method and device of interaction of user data, and the method accesses what user submitted to from each At least one header domain information and network address mark is selected, composition is multiple to access set, and determines each visit in access request Ask set corresponding information loss rate, each unification user mark accessing user is determined according to the set that accesses that information loss rate is minimum Know, and interact each user data accessing user accordingly.Because, in said process, website need not be each to third-party server application Access user's corresponding unification user mark, therefore decrease user profile and divulge a secret chance, increased the safety of website visiting.
Those skilled in the art are it should be appreciated that embodiments herein can be provided as method, system or computer program Product.Therefore, the application can be using complete hardware embodiment, complete software embodiment or the reality combining software and hardware aspect Apply the form of example.And, the application can be using in one or more computers wherein including computer usable program code The upper computer program implemented of usable storage medium (including but not limited to disk memory, CD-ROM, optical memory etc.) produces The form of product.
The application is the flow process with reference to method, equipment (system) and computer program according to the embodiment of the present application Figure and/or block diagram are describing.It should be understood that can be by each stream in computer program instructions flowchart and/or block diagram Flow process in journey and/or square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processor instructing general purpose computer, special-purpose computer, Embedded Processor or other programmable data processing device is to produce A raw machine is so that produced for reality by the instruction of computer or the computing device of other programmable data processing device The device of the function of specifying in present one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions may be alternatively stored in and can guide computer or other programmable data processing device with spy Determine in the computer-readable memory that mode works so that the instruction generation inclusion being stored in this computer-readable memory refers to Make the manufacture of device, this command device realize in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or The function of specifying in multiple square frames.
These computer program instructions also can be loaded in computer or other programmable data processing device so that counting On calculation machine or other programmable devices, execution series of operation steps to be to produce computer implemented process, thus in computer or On other programmable devices, the instruction of execution is provided for realizing in one flow process of flow chart or multiple flow process and/or block diagram one The step of the function of specifying in individual square frame or multiple square frame.
Although having been described for the preferred embodiment of the application, those skilled in the art once know basic creation Property concept, then can make other change and modification to these embodiments.So, claims are intended to be construed to including excellent Select embodiment and fall into being had altered and changing of the application scope.
Obviously, those skilled in the art can carry out the various changes and modification essence without deviating from the application to the application God and scope.So, if these modifications of the application and modification belong to the scope of the application claim and its equivalent technologies Within, then the application is also intended to comprise these changes and modification.

Claims (10)

1. a kind of method of interaction of user data is it is characterised in that include:
Receive each access user submit to access request, carry in access request access user initial user mark, at least one Individual header domain information and network address mark;
Select at least one header domain information from the header domain information that each access request carries, using the header domain information of selection And access the multiple access set of user corresponding network address mark composition;
For multiple each access set accessing in set, determine that this access is integrated into corresponding in the range of specified data traffic Information loss rate, wherein, information loss rate characterizes and determines each unification user mark accessing user using this access set Accuracy;
Each described unification user mark accessing user is determined according to the set that accesses that information loss rate is minimum, and according to each access The each user data accessing user of described unification user mark interaction of user.
2. the method for claim 1 is it is characterised in that for multiple each access set accessing in set, determine This access is integrated into corresponding information loss rate in the range of specified data traffic, specifically includes:
Access set for each, the content of the header domain information comprising according to this access set, by this access set group again It is combined into multiple access subsets to close, the element that each access subset closes is content and the network address mark of header domain information;
In the range of described specified data traffic, count each access subset and be combined in each self-corresponding all initial user marks The data traffic carrying;
The data traffic carry in each self-corresponding all initial user marks is combined according to each access subset of statistics, determines This access is integrated into corresponding information loss rate in the range of described specified data traffic.
3. method as claimed in claim 2 is it is characterised in that this access of described determination is integrated in the range of specified data traffic Corresponding information loss rate, determines according to below equation formula:
1 - R W ,
Wherein,
R represents that each access subset that this access set comprises is combined in the number carry in each self-corresponding all initial user marks According to flow sum;
W represents all data traffic sums comprising in the range of specified data traffic.
4. method as claimed in claim 3 is it is characterised in that one access subset of statistics is combined in its corresponding all initial use The data traffic carrying in the mark of family, specifically includes:
In the range of described specified data traffic, count this access subset and close the data traffic carrying, this access subset conjunction correspondence Initial user mark quantity, and this access subset closes the number that the corresponding access subset of corresponding each initial user mark closes Amount;
Close corresponding each initial user mark for this access subset, determine that this access subset is combined in this initial user mark and holds The data traffic carrying;
This access subset is combined in the data traffic sum carry in its corresponding each initial user mark, is defined as this access The data traffic that subclass carries in its corresponding all initial user mark.
5. according to below equation, method as claimed in claim 4 is it is characterised in that determine that this access subset is combined in this initial use The data traffic that family mark carries:
N i * j ,
Wherein:
N is that this access subset closes the data traffic carrying;
This access subset of i closes corresponding initial user and identifies quantity;
J is the quantity that the corresponding access subset of this initial user mark closes.
6. the method for claim 1 is it is characterised in that determine each access according to the minimum access set of information loss rate Before the unification user mark of user, also include:
Determine that the minimum access set corresponding information loss rate of information loss rate is less than predetermined threshold value.
7. the method for claim 1 is it is characterised in that working as access request is HTML (Hypertext Markup Language) http access request When, the header field information that this access request carries includes at least one in following information:The language Accept- that user accepts Language information, user accept coded system Accept-Encoding information, user agent's User-Agent information and Subscription client information.
8. method as claimed in claim 2 is it is characterised in that determine each access according to the minimum access set of information loss rate The unification user mark of user, specifically includes:
The different access subclass comprising in being gathered using minimum the accessing of information loss rate respectively is as the system of different access user One ID.
9. a kind of device of interaction of user data is it is characterised in that include:
Receiving unit, for receiving each initial use accessing the access request that user submits to, carrying access user in access request Family mark, at least one header domain information and network address mark;
Select unit, for selecting at least one header domain information and access from the header domain information that each access request carries User corresponding network address mark composition is multiple to access set;
Determining unit, for accessing set for each, determines that this access is integrated into corresponding letter in the range of specified data traffic Breath loss rate, wherein, information loss rate characterizes the standard determining each unification user mark accessing user using this access set Really property;
Data interaction unit, determines each described unification user accessing user for the set that accesses minimum according to information loss rate Mark, and according to each each user data accessing user of described unification user mark interaction accessing user.
10. device as claimed in claim 9 is it is characterised in that described determining unit, including:
Combination subelement, for gathering for each access, the content of the header domain information being comprised according to this access set, should Access set reconfigures closes for multiple access subsets, and the element that each access subset closes is content and the network of header domain information Address identifies;
Statistics subelement, is combined in each self-corresponding institute in the range of described specified data traffic, counting each access subset The data traffic carrying is had on initial user mark;
Determination subelement, carries for being combined in each self-corresponding all initial user marks according to each access subset of statistics Data traffic, determine that this access is integrated into corresponding information loss rate in the range of described specified data traffic.
CN201210356956.6A 2012-09-21 2012-09-21 A kind of method and apparatus of interaction of user data Active CN103685198B (en)

Priority Applications (5)

Application Number Priority Date Filing Date Title
CN201210356956.6A CN103685198B (en) 2012-09-21 2012-09-21 A kind of method and apparatus of interaction of user data
TW101146891A TWI579708B (en) 2012-09-21 2012-12-12 Method and apparatus for interacting with user data
US14/023,060 US9525744B2 (en) 2012-09-21 2013-09-10 Determining a uniform user identifier for a visiting user
PCT/US2013/059186 WO2014046934A1 (en) 2012-09-21 2013-09-11 Determining a uniform user identifier for a visiting user
JP2015533107A JP5922848B2 (en) 2012-09-21 2013-09-11 Determining a unified user identifier for visiting users

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210356956.6A CN103685198B (en) 2012-09-21 2012-09-21 A kind of method and apparatus of interaction of user data

Publications (2)

Publication Number Publication Date
CN103685198A CN103685198A (en) 2014-03-26
CN103685198B true CN103685198B (en) 2017-03-01

Family

ID=50321524

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210356956.6A Active CN103685198B (en) 2012-09-21 2012-09-21 A kind of method and apparatus of interaction of user data

Country Status (5)

Country Link
US (1) US9525744B2 (en)
JP (1) JP5922848B2 (en)
CN (1) CN103685198B (en)
TW (1) TWI579708B (en)
WO (1) WO2014046934A1 (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107104928B (en) * 2016-02-23 2020-06-12 阿里巴巴集团控股有限公司 Service implementation method and device
US10348745B2 (en) 2017-01-05 2019-07-09 Cisco Technology, Inc. Associating a user identifier detected from web traffic with a client address
US11783087B1 (en) * 2019-10-15 2023-10-10 Shape Security, Inc. Facilitating secure client data transfer
CN116776310B (en) * 2023-08-23 2024-01-05 深圳红途科技有限公司 Automatic user account identification method and device, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6141778A (en) * 1998-06-29 2000-10-31 Mci Communications Corporation Method and apparatus for automating security functions in a computer system
US7761558B1 (en) * 2006-06-30 2010-07-20 Google Inc. Determining a number of users behind a set of one or more internet protocol (IP) addresses
CN102143091A (en) * 2010-08-06 2011-08-03 华为技术有限公司 Cross-domain operation realization method, system, server and browser

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8490168B1 (en) 2005-10-12 2013-07-16 At&T Intellectual Property I, L.P. Method for authenticating a user within a multiple website environment to provide secure access
EP2413262A1 (en) * 2006-03-29 2012-02-01 The Bank of Tokyo-Mitsubishi UFJ, Ltd. Apparatus, method, and program for validating user
US8620896B2 (en) * 2007-12-06 2013-12-31 Yahoo! Inc. Reverse matching relationships in networks of existing identifiers
US8626926B2 (en) * 2008-02-26 2014-01-07 Qualcomm Incorporated Method and apparatus for performing session info query for user plane location
US8352319B2 (en) 2009-03-10 2013-01-08 Google Inc. Generating user profiles
US8204833B2 (en) 2009-05-27 2012-06-19 Softroute Corporation Method for fingerprinting and identifying internet users
JP2012014652A (en) * 2010-07-05 2012-01-19 Zenrin Datacom Co Ltd Content distribution system and content distribution method
US8913553B2 (en) * 2010-07-23 2014-12-16 Htc Corporation Method of handling close subscriber group list synchronization
US8429160B2 (en) 2010-10-12 2013-04-23 Robert Osann, Jr. User preference correlation for web-based selection
JP5596578B2 (en) * 2011-01-26 2014-09-24 ビッグローブ株式会社 Address book creation system, address book creation method and program

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6141778A (en) * 1998-06-29 2000-10-31 Mci Communications Corporation Method and apparatus for automating security functions in a computer system
US7761558B1 (en) * 2006-06-30 2010-07-20 Google Inc. Determining a number of users behind a set of one or more internet protocol (IP) addresses
CN102143091A (en) * 2010-08-06 2011-08-03 华为技术有限公司 Cross-domain operation realization method, system, server and browser

Also Published As

Publication number Publication date
US20140089499A1 (en) 2014-03-27
TWI579708B (en) 2017-04-21
CN103685198A (en) 2014-03-26
TW201413468A (en) 2014-04-01
JP2015537282A (en) 2015-12-24
US9525744B2 (en) 2016-12-20
JP5922848B2 (en) 2016-05-24
WO2014046934A1 (en) 2014-03-27

Similar Documents

Publication Publication Date Title
US10693981B2 (en) Provisioning personalized content recommendations
US10362050B2 (en) System and methods for scalably identifying and characterizing structural differences between document object models
CN102576443B (en) Audience segment estimation
CN103678321B (en) Page elements determine method and apparatus, user behavior determining method of path and device
CN102737019B (en) Machine behavior determines method, web browser and web page server
CN107451199A (en) Method for recommending problem and device, equipment
US8463896B2 (en) Dynamic portal creation based on personal usage
EP3605355A1 (en) Predicting user navigation events
US20170300485A1 (en) Placement of hyperlinks in documents
CN102932206B (en) The method and system of monitoring website access information
US20130086554A1 (en) Analytics Driven Development
US20150082135A1 (en) Method and system for generating comparable visual maps for browsing activity analysis
CN103685198B (en) A kind of method and apparatus of interaction of user data
US20130198240A1 (en) Social Network Analysis
Chuklin et al. A comparative analysis of interleaving methods for aggregated search
CN104111970A (en) Method and device for counting page average residence time and method and device for determining page user viscosity
US11314795B2 (en) User navigation in a target portal
US10334057B2 (en) Pattern based optimization of digital component transmission
CN107526748A (en) A kind of method and apparatus for identifying user and clicking on behavior
CN103530392B (en) Determine the method and apparatus of crawl flow
CN107092650A (en) A kind of Web Log Analysis method and device
CN103365764B (en) A kind of wireless page measurement techniques & apparatuses
Bracke Web usage mining at an academic health sciences library: an exploratory study
CN107301192A (en) A kind of terminal identification method and identification server
WO2016133568A1 (en) Adaptive media

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant